The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.展开更多
One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this pa...One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this paper presents a class of code-domain nonorthogonal multiple accesses(NOMAs)for uplink ultra reliable networking of massive IoMT based on tactical datalink such as Link-16 and joint tactical information distribution system(JTIDS).In the considered scenario,a satellite equipped with Nr antennas servers K devices including vehicles,drones,ships,sensors,handset radios,etc.Nonorthogonal coded modulation,a special form of multiple input multiple output(MIMO)-NOMA is proposed.The discussion starts with evaluating the output signal to interference-plus-noise(SINR)of receiver filter,leading to the unveiling of a closed-form expression for overloading systems as the number of users is significantly larger than the number of devices admitted such that massive connectivity is rendered.The expression allows for the development of simple yet successful interference suppression based on power allocation and phase shaping techniques that maximizes the sum rate since it is equivalent to fixed-point programming as can be proved.The proposed design is exemplified by nonlinear modulation schemes such as minimum shift keying(MSK)and Gaussian MSK(GMSK),two pivotal modulation formats in IoMT standards such as Link-16 and JITDS.Numerical results show that near capacity performance is offered.Fortunately,the performance is obtained using simple forward error corrections(FECs)of higher coding rate than existing schemes do,while the transmit power is reduced by 6 dB.The proposed design finds wide applications not only in IoMT but also in deep space communications,where ultra reliability and massive connectivity is a keen concern.展开更多
The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and ...The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.展开更多
Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising te...Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising technologies contribute to the unprecedented service in 5G.We establish a multiservice heterogeneous network model,which aims to raise the transmission rate under the delay constraints for active control terminals,and optimize the energy efficiency for passive network terminals.A policygradient-based deep reinforcement learning algorithm is proposed to make decisions on user association and power control in the continuous action space.Simulation results indicate the good convergence of the algorithm,and higher reward is obtained compared with other baselines.展开更多
Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamicall...Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamically to improve the information freshness of the short packet based uplink status updates,which is characterized by a recently proposed metric,age of information(Ao I).We first design a status update scheme with channel distribution information(CDI).By relaxing the hard bandwidth constraint and introducing a Lagrangian multiplier,we first decouple the multi-MTCD bandwidth allocation problem into a single MTCD Markov decision process(MDP).Under the MDP framework,after variable substitution,we obtain the single-MTCD status update scheme by solving a linear programming problem.Then,we adjust the Lagrangian multiplier to make the obtained scheme satisfy the relaxed bandwidth constraint.Finally,a greedy policy is built on the proposed scheme to adjust the bandwidth allocation in each slot to satisfy the hard bandwidth constraint.In the unknown environment without CDI,we further design a bandwidth allocation scheme which only maximizes the expected sum Ao I drop within each time slot.Simulation results show that in terms of AoI,the proposed schemes outperform the benchmark schemes.展开更多
The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable th...The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes.展开更多
The Chinese concept of human rights serves as the core value of China’s path of human rights development,guiding the comprehensive advancement of China’s human rights cause and providing Chinese wisdom for the devel...The Chinese concept of human rights serves as the core value of China’s path of human rights development,guiding the comprehensive advancement of China’s human rights cause and providing Chinese wisdom for the development of human rights cause worldwide.Throughout the development process of China’s human rights cause in the new era,the international communication of the Chinese concept of human rights has achieved positive results and played an essential role in the international human rights discourse struggle,external exchanges on human rights,and the transformation of international human rights mechanisms.However,it also faces challenges such as the dominance of Western human rights concepts,the marginalization of the Chinese concept of human rights,the incomplete establishment of China’s external discourse system on human rights,and constraints on international communication channels.Therefore,in the new era,it is crucial to address the weaknesses in the international communication of the Chinese concept of human rights,optimize communication channels,and enhance its international influence.展开更多
With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve...With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects.展开更多
The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based ...The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based on the real-time data collected by their sensor nodes.The IoT not only controls these devices but also monitors their user’s behaviour.One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet.Minimizing energy consumption is a requirement for energyconstrained nodes and outsourced nodes.The IoT nodes deployed in different geographical regions typically have different energy levels.This paper focuses on creating an energy-efficient protocol for IoTwhich can deal with the clustering of nodes and the cluster head selection process.An energy thresholdmodel is developed to select the appropriate cluster heads and also to ensure uniform distribution of energy to those heads andmember nodes.The proposed model envisages an IoT network with three different types of nodes,described here as advanced,intermediate and normal nodes.Normal nodes are first-level nodes,which have the lowest energy use;intermediate nodes are second-level nodes,which have a medium energy requirement;and the advanced class are thirdlevel nodes with the highest energy use.The simulation results demonstrate that the proposed algorithm outperforms other existing algorithms.In tests,it shows a 26%improvement in network lifetime compared with existing algorithms.展开更多
Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled...Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things data.The framework integrates Kalman filtering and Q-learning.Unlike smoothing Kalman filtering,our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction error.Unlike traditional Q-learning,our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from high traffic on the road according to the maximum number of vehicles in the junction roads.For evaluation,the model has been simulated on a single intersection consisting of four roads:east,west,north,and south.A comparison of the developed adaptive quantized Q-learning(AQQL)framework with state-of-the-art and greedy approaches shows the superiority of AQQL with an improvement percentage in terms of the released number of vehicles of AQQL is 5%over the greedy approach and 340%over the state-of-the-art approach.Hence,AQQL provides an effective traffic control that can be applied in today’s intelligent traffic system.展开更多
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ...Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues.展开更多
Internet of Things has received much attention over the past de- cade. With the rapid increase in the use of smart devices, we are now able to collect big data on a daily basis. The data we are gather- ing and related...Internet of Things has received much attention over the past de- cade. With the rapid increase in the use of smart devices, we are now able to collect big data on a daily basis. The data we are gather- ing and related problems are becoming more complex and uncer- tain. Researchers have therefore turned to AI as an efficient way of dealing with the problems created by big data. This special issue of ZTE Communications will be dedicated to development, trends, challenges, and current practices in artificial intelligence for the Internet of Things. Position papers, technology overviews, and case studies are all welcome. Appropriate topics include but are not limited to:展开更多
The Internet of Things (IoT) is emerging as an attractive paradigm involving physical perceptions, cyber interactions, social correlations and even cognitive thinking through a cyber-physical-social-thinking hyperspac...The Internet of Things (IoT) is emerging as an attractive paradigm involving physical perceptions, cyber interactions, social correlations and even cognitive thinking through a cyber-physical-social-thinking hyperspace. In this context, energy management with the purposes of energy saving and high efficiency is a challenging issue. In this work, a taxonomy model is established in reference to the IoT layers (i.e., sensor-actuator layer, network layer, and application layer), and IoT energy management is addressed from the perspectives of supply and demand to achieve green perception, communication, and computing. A smart home scenario is presented as a case study involving the main enabling technologies with supply-side, demand-side, and supply-demand balance considerations, and open issues in the field of IoT energy management are also discussed.展开更多
The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new ch...The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.展开更多
To study the problem of knowledge translation in fuzzy approximation spaces, the concept of rough communication of crisp set in fuzzy approximation spaces is proposed. In a rough communication of crisp set in fuzzy ap...To study the problem of knowledge translation in fuzzy approximation spaces, the concept of rough communication of crisp set in fuzzy approximation spaces is proposed. In a rough communication of crisp set in fuzzy approximation spaces, the problem of uncertainty exists, for each agent has a different language and cannot provide precise communication to each other. By means of some concepts, such as CF rough communication cut, which is a bridge between fuzzy concept and crisp concept, cut analysis of CF rough communication is made, and the relation theorem between CF rough communication and rough communication of crisp concept is obtained. Finally, in order to give an intuitive analysis of the relation between CF rough communication and rough communication of crisp concept, an example is given.展开更多
Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an envi...Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system,a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also,in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platformis tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects.展开更多
Internet of Things (IoT) is innovation in the field of Communication where a number of intelligent devices are involved sharing information and making collaborative decision. IOT is going to be a market-changing force...Internet of Things (IoT) is innovation in the field of Communication where a number of intelligent devices are involved sharing information and making collaborative decision. IOT is going to be a market-changing force for a wide variety of real-time monitoring applications, such as E-healthcare, homes automation system, environmental monitoring and industrial automation as it is supporting to a large number of characteristics and achieving better cost efficiency. This article explores the emerging IoT in terms of the potential Energy Efficiency Reliability (EER) issues. This paper discusses the potential EER barriers with examples and suggests remedies and techniques which are helpful in propelling the development and deployment of IoT applications.展开更多
Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal users with effective and efficient services based on service communi...Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal users with effective and efficient services based on service community. This paper presents a semantic-based similarity algorithm to build the IoT service community. Firstly, the algorithm reflects that the nodes of IoT contain a wealth of semantic information and makes them to build into the concept tree. Then tap the similarity of the semantic information based on the concept tree. Finally, we achieve the optimization of the service community through greedy algorithm and control the size of the service community by adjusting the threshold. Simulation results show the effectiveness and feasibility of this algorithm.展开更多
the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objec...the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.展开更多
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
基金the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.GRANT5,208).
文摘Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.61601346 and 62377039)the Natural Science Basic Research Plan in Shaanxi Province of China(Grant No.2018JQ6044)+2 种基金the Ministry of Industry and Information Technology of the People's Republic of China(Grant No.2023-276-1-1)the Fundamental Research Funds for the Central Universities,Northwestern Polytechnical University(Grant No.31020180QD089)the Aeronautical Science Foundation of China(Grant Nos.20200043053004 and 20200043053005)。
文摘One of the major challenges arising in internet of military things(IoMT)is accommodating massive connectivity while providing guaranteed quality of service(QoS)in terms of ultra-high reliability.In this regard,this paper presents a class of code-domain nonorthogonal multiple accesses(NOMAs)for uplink ultra reliable networking of massive IoMT based on tactical datalink such as Link-16 and joint tactical information distribution system(JTIDS).In the considered scenario,a satellite equipped with Nr antennas servers K devices including vehicles,drones,ships,sensors,handset radios,etc.Nonorthogonal coded modulation,a special form of multiple input multiple output(MIMO)-NOMA is proposed.The discussion starts with evaluating the output signal to interference-plus-noise(SINR)of receiver filter,leading to the unveiling of a closed-form expression for overloading systems as the number of users is significantly larger than the number of devices admitted such that massive connectivity is rendered.The expression allows for the development of simple yet successful interference suppression based on power allocation and phase shaping techniques that maximizes the sum rate since it is equivalent to fixed-point programming as can be proved.The proposed design is exemplified by nonlinear modulation schemes such as minimum shift keying(MSK)and Gaussian MSK(GMSK),two pivotal modulation formats in IoMT standards such as Link-16 and JITDS.Numerical results show that near capacity performance is offered.Fortunately,the performance is obtained using simple forward error corrections(FECs)of higher coding rate than existing schemes do,while the transmit power is reduced by 6 dB.The proposed design finds wide applications not only in IoMT but also in deep space communications,where ultra reliability and massive connectivity is a keen concern.
文摘The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation.However,FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios.The paper systematically reviewed the available literature using the PRISMA guiding principle.The study aims to provide a detailed overview of the increasing use of FL in IoT networks,including the architecture and challenges.A systematic review approach is used to collect,categorize and analyze FL-IoT-based articles.Asearch was performed in the IEEE,Elsevier,Arxiv,ACM,and WOS databases and 92 articles were finally examined.Inclusion measures were published in English and with the keywords“FL”and“IoT”.The methodology begins with an overview of recent advances in FL and the IoT,followed by a discussion of how these two technologies can be integrated.To be more specific,we examine and evaluate the capabilities of FL by talking about communication protocols,frameworks and architecture.We then present a comprehensive analysis of the use of FL in a number of key IoT applications,including smart healthcare,smart transportation,smart cities,smart industry,smart finance,and smart agriculture.The key findings from this analysis of FL IoT services and applications are also presented.Finally,we performed a comparative analysis with FL IID(independent and identical data)and non-ID,traditional centralized deep learning(DL)approaches.We concluded that FL has better performance,especially in terms of privacy protection and resource utilization.FL is excellent for preserving privacy becausemodel training takes place on individual devices or edge nodes,eliminating the need for centralized data aggregation,which poses significant privacy risks.To facilitate development in this rapidly evolving field,the insights presented are intended to help practitioners and researchers navigate the complex terrain of FL and IoT.
基金supported by the National Natural Science Foundation of China under Grant No.61971057。
文摘Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising technologies contribute to the unprecedented service in 5G.We establish a multiservice heterogeneous network model,which aims to raise the transmission rate under the delay constraints for active control terminals,and optimize the energy efficiency for passive network terminals.A policygradient-based deep reinforcement learning algorithm is proposed to make decisions on user association and power control in the continuous action space.Simulation results indicate the good convergence of the algorithm,and higher reward is obtained compared with other baselines.
基金supported by the Natural Science Foundations of China under Grant(62171464,62171461)the National Key R&D Program of China(No.11112018YFB1801103)the Natural Science Foundation on Frontier Leading Technology Basic Research Project of Jiangsu under Grant BK20212001。
文摘Improving the information freshness is critical for the monitoring and controlling applications in the cellular Internet of Things(IoT).In this paper,we are interested in optimizing the bandwidth allocation dynamically to improve the information freshness of the short packet based uplink status updates,which is characterized by a recently proposed metric,age of information(Ao I).We first design a status update scheme with channel distribution information(CDI).By relaxing the hard bandwidth constraint and introducing a Lagrangian multiplier,we first decouple the multi-MTCD bandwidth allocation problem into a single MTCD Markov decision process(MDP).Under the MDP framework,after variable substitution,we obtain the single-MTCD status update scheme by solving a linear programming problem.Then,we adjust the Lagrangian multiplier to make the obtained scheme satisfy the relaxed bandwidth constraint.Finally,a greedy policy is built on the proposed scheme to adjust the bandwidth allocation in each slot to satisfy the hard bandwidth constraint.In the unknown environment without CDI,we further design a bandwidth allocation scheme which only maximizes the expected sum Ao I drop within each time slot.Simulation results show that in terms of AoI,the proposed schemes outperform the benchmark schemes.
文摘The Internet ofMedical Things(IoMT)is mainly concernedwith the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically,whereas machine learning approaches enable these smart systems to make informed decisions.Generally,broadcasting is used for the transmission of frames,whereas congestion,energy efficiency,and excessive load are among the common issues associated with existing approaches.In this paper,a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames,especially with the minimum possible communication overheads in the IoMT network.For this purpose,the proposed scheme utilises a well-known technique,i.e.,Kruskal’s algorithm,to find an optimal path from source to destination wearable devices.Additionally,other evaluation metrics are used to find a reliable and shortest possible communication path between the two interested parties.Apart from that,every device is bound to hold a supplementary path,preferably a second optimised path,for situations where the current communication path is no longer available,either due to device failure or heavy traffic.Furthermore,the machine learning approach helps enable these devices to update their routing tables simultaneously,and an optimal path could be replaced if a better one is available.The proposed mechanism has been tested using a smart environment developed for the healthcare domain using IoMT networks.Simulation results show that the proposed machine learning-oriented approach performs better than existing approaches where the proposed scheme has achieved the minimum possible ratios,i.e.,17%and 23%,in terms of end to end delay and packet losses,respectively.Moreover,the proposed scheme has achieved an approximately 21%improvement in the average throughput compared to the existing schemes.
文摘The Chinese concept of human rights serves as the core value of China’s path of human rights development,guiding the comprehensive advancement of China’s human rights cause and providing Chinese wisdom for the development of human rights cause worldwide.Throughout the development process of China’s human rights cause in the new era,the international communication of the Chinese concept of human rights has achieved positive results and played an essential role in the international human rights discourse struggle,external exchanges on human rights,and the transformation of international human rights mechanisms.However,it also faces challenges such as the dominance of Western human rights concepts,the marginalization of the Chinese concept of human rights,the incomplete establishment of China’s external discourse system on human rights,and constraints on international communication channels.Therefore,in the new era,it is crucial to address the weaknesses in the international communication of the Chinese concept of human rights,optimize communication channels,and enhance its international influence.
基金supported by Jiangsu Provincial Natural Science Fund(BK20150247)the Fundamental Research Funds for Postgraduate Research&Practice Innovation Program of Jiangsu Province(XSJCX22_36,XSJCX22_44,SJCX22_1479)
文摘With the improvement of the degree of aging,the traditional pension model can no longer meet the growing needs of the elderly.Therefore,it is necessary to use the intelligent means of information technology to improve the level of pension services.This paper will integrate multi-sensor fusion technology,NB-IoT communication technology and cloud platform technology to develop and design a smart pension online monitoring system to realize real-time collection of human health and motion status information and realize monitoring platform management.In this system,STM32 microcontroller will be used as the main control module,and MAX30102,ADXL345 and DS18B20 sensors will be used to collect the heart rate,blood oxygen,displacement and body temperature of the human body in real time.On the one hand,the communication part is completed by the BC20 Internet of Things module.The data transmission between the terminal detection device and the cloud platform,on the other hand,the HC-42 Bluetooth module is used to complete the data communication with the mobile phone.The test results show that the system can collect and process data accurately in real time and maintain good communication with the cloud platform and mobile phone.The designed system has strong pertinence,easy operation,high reliability and broad development prospects.
文摘The internet of things(IoT)has a wide variety of applications,which in turn raisesmany challenging issues.IoT technology enables devices to closely monitor their environment,providing context-aware intelligence based on the real-time data collected by their sensor nodes.The IoT not only controls these devices but also monitors their user’s behaviour.One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet.Minimizing energy consumption is a requirement for energyconstrained nodes and outsourced nodes.The IoT nodes deployed in different geographical regions typically have different energy levels.This paper focuses on creating an energy-efficient protocol for IoTwhich can deal with the clustering of nodes and the cluster head selection process.An energy thresholdmodel is developed to select the appropriate cluster heads and also to ensure uniform distribution of energy to those heads andmember nodes.The proposed model envisages an IoT network with three different types of nodes,described here as advanced,intermediate and normal nodes.Normal nodes are first-level nodes,which have the lowest energy use;intermediate nodes are second-level nodes,which have a medium energy requirement;and the advanced class are thirdlevel nodes with the highest energy use.The simulation results demonstrate that the proposed algorithm outperforms other existing algorithms.In tests,it shows a 26%improvement in network lifetime compared with existing algorithms.
文摘Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision.In this article,these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things data.The framework integrates Kalman filtering and Q-learning.Unlike smoothing Kalman filtering,our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction error.Unlike traditional Q-learning,our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from high traffic on the road according to the maximum number of vehicles in the junction roads.For evaluation,the model has been simulated on a single intersection consisting of four roads:east,west,north,and south.A comparison of the developed adaptive quantized Q-learning(AQQL)framework with state-of-the-art and greedy approaches shows the superiority of AQQL with an improvement percentage in terms of the released number of vehicles of AQQL is 5%over the greedy approach and 340%over the state-of-the-art approach.Hence,AQQL provides an effective traffic control that can be applied in today’s intelligent traffic system.
文摘Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues.
文摘Internet of Things has received much attention over the past de- cade. With the rapid increase in the use of smart devices, we are now able to collect big data on a daily basis. The data we are gather- ing and related problems are becoming more complex and uncer- tain. Researchers have therefore turned to AI as an efficient way of dealing with the problems created by big data. This special issue of ZTE Communications will be dedicated to development, trends, challenges, and current practices in artificial intelligence for the Internet of Things. Position papers, technology overviews, and case studies are all welcome. Appropriate topics include but are not limited to:
文摘The Internet of Things (IoT) is emerging as an attractive paradigm involving physical perceptions, cyber interactions, social correlations and even cognitive thinking through a cyber-physical-social-thinking hyperspace. In this context, energy management with the purposes of energy saving and high efficiency is a challenging issue. In this work, a taxonomy model is established in reference to the IoT layers (i.e., sensor-actuator layer, network layer, and application layer), and IoT energy management is addressed from the perspectives of supply and demand to achieve green perception, communication, and computing. A smart home scenario is presented as a case study involving the main enabling technologies with supply-side, demand-side, and supply-demand balance considerations, and open issues in the field of IoT energy management are also discussed.
基金supported in part by the National Science Foundation Project of China (61931001, 61873026)the National Key R&D Program of China (2017YFC0820700)
文摘The industrial Internet of Things(IoT)is a trend of factory development and a basic condition of intelligent factory.It is very important to ensure the security of data transmission in industrial IoT.Applying a new chaotic secure communication scheme to address the security problem of data transmission is the main contribution of this paper.The scheme is proposed and studied based on the synchronization of different-structure fractional-order chaotic systems with different order.The Lyapunov stability theory is used to prove the synchronization between the fractional-order drive system and the response system.The encryption and decryption process of the main data signals is implemented by using the n-shift encryption principle.We calculate and analyze the key space of the scheme.Numerical simulations are introduced to show the effectiveness of theoretical approach we proposed.
基金supported by the Natural Science Foundation of Shandong Province (Y2006A12)the Scientific Research Development Project of Shandong Provincial Education Department (J06P01)+2 种基金the Science and Technology Foundation of Universityof Jinan (XKY0808 XKY0703)the Doctoral Foundation of University of Jinan (B0633).
文摘To study the problem of knowledge translation in fuzzy approximation spaces, the concept of rough communication of crisp set in fuzzy approximation spaces is proposed. In a rough communication of crisp set in fuzzy approximation spaces, the problem of uncertainty exists, for each agent has a different language and cannot provide precise communication to each other. By means of some concepts, such as CF rough communication cut, which is a bridge between fuzzy concept and crisp concept, cut analysis of CF rough communication is made, and the relation theorem between CF rough communication and rough communication of crisp concept is obtained. Finally, in order to give an intuitive analysis of the relation between CF rough communication and rough communication of crisp concept, an example is given.
基金Taif University Researchers Supporting Project(TURSP-2020/36),Taif University,Taif,Saudi Arabia.
文摘Technological advances in recent years have significantly changed the way an operating room works.This work aims to create a platformto solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations.Using this system,a doctor can control all operation rooms,especially before an operation,and monitor their temperature and humidity to prepare for the operation.Also,in the event of a problem,an alert is sent to the nurse responsible for the room and medical stuff so that the problem can be resolved.The platformis tested using a Raspberry PI card and sensors.The sensors are connected to a cloud layer that collects and analyzes the temperature and humidity values obtained from the environment during an operation.The result of experimentations is visualized through a web application and an Android application.The platform also considers the security aspects such as authorization to access application functionalities for the Web and the mobile applications.We can also test and evaluate the system’s existing problems and vulnerabilities using the IEEE and owasp IoT standards.Finally,the proposed framework is extended with a model based testing technique that may be adopted for validating the security aspects.
文摘Internet of Things (IoT) is innovation in the field of Communication where a number of intelligent devices are involved sharing information and making collaborative decision. IOT is going to be a market-changing force for a wide variety of real-time monitoring applications, such as E-healthcare, homes automation system, environmental monitoring and industrial automation as it is supporting to a large number of characteristics and achieving better cost efficiency. This article explores the emerging IoT in terms of the potential Energy Efficiency Reliability (EER) issues. This paper discusses the potential EER barriers with examples and suggests remedies and techniques which are helpful in propelling the development and deployment of IoT applications.
基金Supported by the China Postdoctoral Science Foundation(No. 20100480701)the Ministry of Education of Humanities and Social Sciences Youth Fund Project(11YJC880119)
文摘Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal users with effective and efficient services based on service community. This paper presents a semantic-based similarity algorithm to build the IoT service community. Firstly, the algorithm reflects that the nodes of IoT contain a wealth of semantic information and makes them to build into the concept tree. Then tap the similarity of the semantic information based on the concept tree. Finally, we achieve the optimization of the service community through greedy algorithm and control the size of the service community by adjusting the threshold. Simulation results show the effectiveness and feasibility of this algorithm.
文摘the world is experiencing a strong rush towards modern technology, while specialized companies are living a terrible rush in the information technology towards the so-called Internet of things IoT or Internet of objects,</span><span style="font-family:""> </span><span style="font-family:Verdana;">which is the integration of things with the world of Internet, by adding hardware or/and software to be smart and so be able to communicate with each other and participate effectively in all aspects of daily life,</span><span style="font-family:""> </span><span style="font-family:Verdana;">so enabling new forms of communication between people and things, and between things themselves, that’s will change the traditional life into a high style of living. But it won’t be easy, because there are still many challenges an</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;"> issues that need to be addressed and have to be viewed from various aspects to realize </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> full potential. The main objective of this review paper will provide the reader with a detailed discussion from a technological and social perspective. The various IoT challenges and issues, definition and architecture were discussed. Furthermore, a description of several sensors and actuators and </span><span style="font-family:Verdana;">their</span><span style="font-family:Verdana;"> smart communication. Also, the most important application areas of IoT were presented. This work will help readers and researchers understand the IoT and its potential application in the real world.